Travelled to:
1 × Italy
1 × South Korea
2 × Canada
4 × USA
Collaborated with:
L.F.Cranor M.K.Reiter R.W.Reeder M.L.Mazurek K.Vaniea R.Shay J.Ligatti D.Walker N.Christin S.Komanduri B.Ur P.F.Klemperer S.M.Segreti Y.Liang N.Gupta H.Takabi K.Bacon K.How H.Strong P.G.Kelley S.Egelman M.Sleeper A.Forget W.Melicher A.L.Durity P.(.Huh J.P.Arsenault J.Bresee I.Ion C.Johns D.Lee J.Olsen B.Salmon G.R.Ganger
Talks about:
control (6) access (6) password (4) polici (4) secur (3) creation (2) system (2) measur (2) effect (2) usabl (2)
Person: Lujo Bauer
DBLP: Bauer:Lujo
Contributed to:
Wrote 11 papers:
- CHI-2015-ShayBCCFKMMSU #behaviour #feedback
- A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior (RS, LB, NC, LFC, AF, SK, MLM, WM, SMS, BU), pp. 2903–2912.
- CHI-2014-ShayKDHMSUBCC #question
- Can long passwords be secure and usable? (RS, SK, ALD, P(H, MLM, SMS, BU, LB, NC, LFC), pp. 2927–2936.
- CHI-2012-KlempererLMSUBCGR #data access #exclamation #using
- Tag, you can see it!: using tags for access control in photo sharing (PFK, YL, MLM, MS, BU, LB, LFC, NG, MKR), pp. 377–386.
- CHI-2011-KomanduriSKMBCCE #people #policy
- Of passwords and people: measuring the effect of password-composition policies (SK, RS, PGK, MLM, LB, NC, LFC, SE), pp. 2595–2604.
- CHI-2011-MazurekKSTBC #data access
- Exploring reactive access control (MLM, PFK, RS, HT, LB, LFC), pp. 2085–2094.
- CHI-2011-ReederBCRV #usability
- More than skin deep: measuring effects of the underlying model on access-control system usability (RWR, LB, LFC, MKR, KV), pp. 2065–2074.
- CHI-2010-MazurekABGIJLLOSSVBCGR #data access #social
- Access control for home data sharing: evaluating social acceptability (MLM, JPA, JB, NG, II, CJ, DL, YL, JO, BS, RS, KV, LB, LFC, GRG, MKR), pp. 645–654.
- CHI-2009-BauerCRRV #challenge
- Real life challenges in access-control management (LB, LFC, RWR, MKR, KV), pp. 899–908.
- CHI-2008-BauerCRRV #case study #flexibility #policy #user study
- A user study of policy creation in a flexible access-control system (LB, LFC, RWR, MKR, KV), pp. 543–552.
- CHI-2008-ReederBCRBHS #authoring #policy #security #visualisation
- Expandable grids for visualizing and authoring computer security policies (RWR, LB, LFC, MKR, KB, KH, HS), pp. 1473–1482.
- PLDI-2005-BauerLW #policy #security
- Composing security policies with polymer (LB, JL, DW), pp. 305–314.